| 2020 | A Data Access Model for Privacy-Preserving Cloud-IoT Architectures. Maribel Fernández, Alex Franch Tapia, Jenjira Jaimunk, Manuel Martinez Chamorro, Bhavani Thuraisingham |
| 2020 | A Decision Tree Learning Approach for Mining Relationship-Based Access Control Policies. Thang Bui, Scott D. Stoller |
| 2020 | ABAC-CC: Attribute-Based Access Control and Communication Control for Internet of Things. Smriti Bhatt, Ravi S. Sandhu |
| 2020 | AQUA: An Efficient Solver for the User Authorization Query Problem. Alessandro Armando, Giorgia A. Gazzarata, Fatih Turkmen |
| 2020 | Accept - Maybe - Decline: Introducing Partial Consent for the Permission-based Access Control Model of Android. Nurul Momen, Sven Bock, Lothar Fritsch |
| 2020 | Active Learning of Relationship-Based Access Control Policies. Padmavathi Iyer, Amirreza Masoumzadeh |
| 2020 | Analysis of Access Control Enforcement in Android. William Enck |
| 2020 | Automated Strong Mutation Testing of XACML Policies. Dianxiang Xu, Roshan Shrestha, Ning Shen |
| 2020 | Benchmarking UAQ Solvers. Alessandro Armando, Giorgia Gazzarata, Fatih Turkmen |
| 2020 | Constraint Branching in Workflow Satisfiability Problem. Gregory Z. Gutin, Daniel Karapetyan |
| 2020 | Cryptography for #MeToo. Tal Rabin |
| 2020 | Declarative Access Control for Aggregations of Multiple Ownership Data. Marco Rosa, Francesco Di Cerbo, Rocío Cabrera Lozoya |
| 2020 | Deploying Access Control Enforcement for IoT in the Cloud-Edge Continuum with the help of the CAP Theorem. Tahir Ahmad, Umberto Morelli, Silvio Ranise |
| 2020 | Informed Privilege-Complexity Trade-Offs in RBAC Configuration. Jon Currey, Robbie McKinstry, Armon Dadgar, Mark Gritter |
| 2020 | Mammoth: Monitoring the ABAC Monitor of MQTT-based Internet of Things ecosystems. Pietro Colombo, Elena Ferrari, Samuele Salvia |
| 2020 | Matrix Decomposition: Analysis of an Access Control Approach on Transaction-based DAGs without Finality. Florian Jacob, Luca Becker, Jan Grashöfer, Hannes Hartenstein |
| 2020 | Metering Graphical Data Leakage with Snowman. Qiuyu Xiao, Brittany Subialdea, Lujo Bauer, Michael K. Reiter |
| 2020 | Multi-party Access Control - 10 Years of Successes and Lessons Learned. Anna Cinzia Squicciarini |
| 2020 | Norm-based Access Control. Onuralp Ulusoy, Pinar Yolum |
| 2020 | On Security Policy Migrations. Jorge Lobo, Elisa Bertino, Alessandra Russo |
| 2020 | Parallel Space Traveling: A Security Analysis of App-Level Virtualization in Android. Deshun Dai, Ruixuan Li, Junwei Tang, Ali Davanian, Heng Yin |
| 2020 | Poster: IoT SENTINEL - An ABAC Approach Against Cyber-Warfare In Organizations. Paras Bhatt, Smriti Bhatt, Myung Ko |
| 2020 | Proactive Risk Assessment for Preventing Attribute-Forgery Attacks to ABAC Policies. Carlos E. Rubio-Medrano, Luis Claramunt, Shaishavkumar Jogani, Gail-Joon Ahn |
| 2020 | Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, SACMAT 2020, Barcelona, Spain, June 10-12, 2020. Jorge Lobo, Scott D. Stoller, Peng Liu |
| 2020 | Security and Privacy Analysis of Android Family Locator Apps. Khalid Alkhattabi, Ahmed Alshehri, Chuan Yue |
| 2020 | Visualizing and Interpreting RNN Models in URL-based Phishing Detection. Tao Feng, Chuan Yue |